Research and Reports
Software Selection Services
Stay connected with us
Featured Documents related to
Get Free ERP Systems Comparisons Now
Find the best ERP software solution for your business!
Use the software selection tool employed by IT professionals in thousands of selection projects per year. FREE software comparisons based on your organization's unique needsquickly and easily!
Register to access your free comparison reports and more!
I'm doing research for my company
I'm doing research for my client
I'm a software vendor
I'm a student
Antigua and Barbuda
British Indian Ocean Territory
Central African Republic
Cocos (Keeling) Islands
Congo (Dem. Republic)
Falkland Islands (Malvinas)
French Southern Territories
Guernsey and Alderney
Heard and McDonald Islands
Island of Man
Korea (Democratic Republic of)
Korea (Republic of)
Libyan Arab Jamahiriya
Northern Mariana Islands
Saint Kitts and Nevis
Saint Pierre and Miquelon
Saint Vincent and the Grenadines
Sao Tome and Principe
South Georgia and South Sandwich Islands
Svalbard and Jan Mayen Islands
Syrian Arab Republic
Trinidad and Tobago
Turks and Caicos Islands
United Arab Emirates
United States Minor Outlying Islands
Vatican (Holy See)
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis and Futuna Islands
District of Columbia
Send me the TEC Newsletter:
Enter security code:
Already have a TEC account?
Sign in here.
Documents related to
Search Engines Used to Attack Databases
Hackers have recently started to use search engines to find web-facing database interfaces that can be used to mount attacks on databases placed behind a firewall. This is a significant new development, completely exposing previously “protected” databases to outside attack. In fact, an attacker can data mine any of the commonly used search engines to find target databases to attack.
3/8/2007 2:27:00 PM
Targeted Trojans: The Silent Danger of Clever Malware
IT managers face heavy demands, limited resources, and a highly mobile workforce. These challenges make it difficult to keep employees secure. This paper discusses the modern Trojan attack. It explores the methodology hackers use to select a target and develop an attack, and cites examples of successful Trojans. Learn more about security solutions that can help protect your organization from targeted Trojans.
: Symantec Hosted Services, remover trojan, trojan antivirus, trojan tool, trojan backdoor, attack dos, trojan horse removal, trojan spyware, trojan scan, trojan worm, trojan anti virus, trojan malware, trojan delete, hacker attack, prevent attack, trojan viruses, trojan security, network attack, trojan fix, trojan removing, trojan horse remover, trojan tools, trojan cleaner, trojan virus remover, remove trojans, trojan clean, smurf attack, trojan hack, trojan protection, trojan infected, trojan removers, trojan attack, trojan worms, hackers attack, malware attack, netbus trojan, trojan horse .
8/13/2010 11:38:00 AM
Protecting Users from Firesheep and Other Sidejacking Attacks with SSL
The recent release of the Firesheep Wi-Fi attack tool has increased awareness among both users and attackers of the inherent insecurity of unprotected HTTP connections. Firesheep allows an attacker connected to the local network to monitor the Web sessions of other users on that network. According to experts, the best solution is to use TLS/SSL for all connections to Web sites. Download this white paper to learn how to avoid these attacks.
: firesheep wi-fi attack tool, sidejacking, unprotected http connections, public wi-fi security, tls/ssl, public web site security, sidejacking software, hamster sidejacking, sidejacking with hamster, sidejacking tools, sidejacking hamster, session sidejacking, sidejacking download, sidejacking tutorial, wireless networking security, unsecured wi-fi.
10/7/2011 3:12:00 PM
Firewall RFP Template
: Firewall RFP Template covers industry-standard functional criteria of Firewall that can help you easily gather and prioritize your business needs in a simple and categorized excel document. More than a RFP template, it is a working document that serves as a knowledge base reference throughout the life-span of your Firewall software project. Includes: Firewall Type, Decision Engine, Scalability, Network Interfaces, Operating Systems, Routing and Network Protocols, SNMP, NAT, Policy Features, Proxies, Authentication, Logging, Content Filtering, VPN and Encryption, Attack Resiliency, Certification, and more
Information Security RFP Template
: Information Security RFP Template covers industry-standard functional criteria of Information Security that can help you easily gather and prioritize your business needs in a simple and categorized excel document. More than a RFP template, it is a working document that serves as a knowledge base reference throughout the life-span of your Information Security software project. Includes: Firewall System,Intrusion Detection System,Anti-Virus System,Virtual Private Network (VPN),Public Key Infrastructure (PKI),Enterprise Applications,Cryptographic Module
Security for Small and Medium Businesses » The TEC Blog
: antivirus, Cisco, Juniper Networks, McAfee, software security, Symantec, TEC, Technology Evaluation, Technology Evaluation Centers, Technology Evaluation Centers Inc., blog, analyst, enterprise software, decision support.
Author Attacks Harvard! (Sort of... well, not really... OK, not at all) » The TEC Blog
: CRM, customer relationship management, white papers, TEC, Technology Evaluation, Technology Evaluation Centers, Technology Evaluation Centers Inc., blog, analyst, enterprise software, decision support.
The SaaS Advantage
Discover the software as a service (SaaS) advantage.We bring SaaS expert advice right to you.Free white papers! More providers of traditional software solutions are moving to software-as-a-service (SaaS) models that meet today’s competitive needs for agility and real-time information, without requiring manufacturers to make a large up-front financial outlay. Confidence continues to increase thanks to pioneering SaaS providers who are able to point to a history of successful implementation. Learn more about the benefits of SaaS.
: Plex Online, saas, software as a service, saas software, asp saas, saas service, saas crm, saas management, saas model, saas software as a service, erp saas, saas business, saas companies, microsoft saas, saas application, saas security, saas solutions, saas applications, saas architecture, saas market, saas platform, saas sales, what is saas, saas services, saas vendors, it saas, saas company, saas development, saas hosting, saas pricing, saas providers, saas solution, saas wiki, net saas, saas accounting, saas email, saas integration, saas ppt, saas project, saas provider.
3/30/2010 11:54:00 AM
Compaq, HP, IBM, Intel and Microsoft Create New PC Security Alliance
Five key vendors, Compaq, HP, IBM, Intel, and Microsoft have allied together to develop a new hardware and software specification for personal computer security. The alliance has set a goal of publishing a specification proposal by the second half of 2000. It remains to be seen what impact this will have on the rapidly increasing number of information security attacks.
: about computer security, advanced computer security, biometric computer security, business computer security, cert computer security, compare computer security, complete computer security, computer and network security, computer data security, computer hardware security, computer information systems security, computer internet security, computer network security, computer network security software, computer networking security, computer networks security, computer privacy security, computer security, computer security applications, computer security article, computer security articles, .
Firewall Software Evaluation Report
: Firewall Software Evaluation Report allows you to compare and analyze the features, functions, and services of multiple enterprise software solutions. Vendor responses are comprehensively rated on their level of support of for each criterion (supported, not supported, customization, future releases, etc.) to ensure you make and accurate and informed decision.
Boosting the Bottom Line with Master Data Management
You may not have heard of master data management (MDM), but it can help an organization cut costs while strengthening its sales and marketing efforts. Find out how MDM can help boost your company's bottom line in this latest podcast.
: master data management, MDM, Siperian, sales and marketing, business intelligence, BI, business performance management, sales leads, customer service, master data solutions, back office application, call center, customer processes, business processes, core profile information, data quality, customer retention, customer loyalty, CRM, inside sales.
White Paper Newsletters